安全攻防工程师

Bybit

Bybit

Alió, Tarragona, Spain
Posted on Mar 11, 2025
Job description

Job Responsibilities

Red-Blue Team Exercises

Develop and execute penetration testing and adversarial plans simulating real-world attack scenarios to identify potential vulnerabilities in the organization's network, applications, and systems.

Lead or participate in red-blue team exercises to assess the detection, response, and recovery capabilities of the defense team.

Attack Surface Analysis

Identify the organization's network exposure and evaluate risks, providing appropriate mitigation recommendations.

Monitor and gather threat intelligence, analyze attack trends, and apply findings to adversarial exercises.

Tools and Technology Development

Develop and optimize tools and scripts for red team activities, including vulnerability discovery, privilege escalation, and lateral movement.

Research and validate emerging attack techniques, simulating realistic threats tailored to the organization's environment.

Security Assessment and Reporting

Conduct penetration tests on critical business systems, internal networks, and cloud environments, delivering detailed assessment reports and remediation recommendations.

Assist in improving the organization’s security mechanisms and promote the optimization of security systems.

Cross-Department Collaboration

Collaborate with the defense team (blue team) on post-attack reviews and vulnerability remediation.

Provide security support to other departments, including incident response drills and development security consultation.

Job Requirements

Fundamental Skills

Solid understanding of network security fundamentals, including TCP/IP protocols, network architecture, and the principles and configuration of security devices.

Proficiency in common attack techniques and tools (e.g., Sliver, NPS, Burp Suite).

Familiarity with mainstream operating systems (Windows, Linux, Mac) and the security mechanisms and vulnerability exploitation techniques of common web frameworks.

Technical Proficiency

Thorough knowledge of penetration testing processes and methodologies, including information gathering, vulnerability scanning, internal network penetration, attacks, and persistence.

Expertise in one or more programming/scripting languages (e.g., Python, Go, Bash).

Experience Requirements

At least 5 years of experience in red team/penetration testing, with preference for candidates experienced in large-scale adversarial exercises.

Familiarity with enterprise-level security products (e.g., WAF, EDR, SIEM) and bypass techniques.

Additional Skills

Possession of relevant security certifications (e.g., OSCP, OSCE, CISSP, CISP, CEH) is a plus.

Strong documentation skills with the ability to produce high-quality technical reports.

High sense of responsibility, strong team collaboration, and ability to work under pressure.

Bonus Points

Familiarity with cloud platform security (e.g., AWS, Tencent, Azure) and offensive/defensive techniques.

Hands-on experience with zero-trust architectures or security operations projects.

A keen awareness of new technologies and tools in the security industry, coupled with a proactive attitude towards knowledge sharing.

Job Responsibilities

Red-Blue Team Exercises

Develop and execute penetration testing and adversarial plans simulating real-world attack scenarios to identify potential vulnerabilities in the organization's network, applications, and systems.

Lead or participate in red-blue team exercises to assess the detection, response, and recovery capabilities of the defense team.

Attack Surface Analysis

Identify the organization's network exposure and evaluate risks, providing appropriate mitigation recommendations.

Monitor and gather threat intelligence, analyze attack trends, and apply findings to adversarial exercises.

Tools and Technology Development

Develop and optimize tools and scripts for red team activities, including vulnerability discovery, privilege escalation, and lateral movement.

Research and validate emerging attack techniques, simulating realistic threats tailored to the organization's environment.

Security Assessment and Reporting

Conduct penetration tests on critical business systems, internal networks, and cloud environments, delivering detailed assessment reports and remediation recommendations.

Assist in improving the organization’s security mechanisms and promote the optimization of security systems.

Cross-Department Collaboration

Collaborate with the defense team (blue team) on post-attack reviews and vulnerability remediation.

Provide security support to other departments, including incident response drills and development security consultation.

Job Requirements

Fundamental Skills

Solid understanding of network security fundamentals, including TCP/IP protocols, network architecture, and the principles and configuration of security devices.

Proficiency in common attack techniques and tools (e.g., Sliver, NPS, Burp Suite).

Familiarity with mainstream operating systems (Windows, Linux, Mac) and the security mechanisms and vulnerability exploitation techniques of common web frameworks.

Technical Proficiency

Thorough knowledge of penetration testing processes and methodologies, including information gathering, vulnerability scanning, internal network penetration, attacks, and persistence.

Expertise in one or more programming/scripting languages (e.g., Python, Go, Bash).

Experience Requirements

At least 5 years of experience in red team/penetration testing, with preference for candidates experienced in large-scale adversarial exercises.

Familiarity with enterprise-level security products (e.g., WAF, EDR, SIEM) and bypass techniques.

Additional Skills

Possession of relevant security certifications (e.g., OSCP, OSCE, CISSP, CISP, CEH) is a plus.

Strong documentation skills with the ability to produce high-quality technical reports.

High sense of responsibility, strong team collaboration, and ability to work under pressure.

Bonus Points

Familiarity with cloud platform security (e.g., AWS, Tencent, Azure) and offensive/defensive techniques.

Hands-on experience with zero-trust architectures or security operations projects.

A keen awareness of new technologies and tools in the security industry, coupled with a proactive attitude towards knowledge sharing.